-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add signing for cert-manager artifacts #4473
Comments
|
Update 2021-11-23: I still need to do the infrastructure for this, which involves first provisioning a cert-manager-infrastructure account in CNCF's GCP org. We're also still blocked on actually pushing cosign signatures since quay.io still doesn't support them. |
|
Issues go stale after 90d of inactivity. |
|
Stale issues rot after 30d of inactivity. |
|
Worth updating again here: I had delayed work on this pending quay.io adding support and softly behind formally moving the cert-manager-release project into the CNCF org. The org move is now pretty firmly blocked since the person taking care of it has other priorities, but the quay.io support seems to be there. I should revisit this. |
|
/remove-lifecycle rotten |
|
Issues go stale after 90d of inactivity. |
|
Stale issues rot after 30d of inactivity. |
|
/remove-lifecycle rotten |
|
Issues go stale after 90d of inactivity. |
|
/remove-lifecycle stale |
|
I think this can be closed - IaC would be great for this but there's no resourcing for it and it won't happen any time soon. |
Overview
Supply chain security is a popular topic in infosec at the moment, largely because of several high-profile incidents using supply chain attacks. The issue is getting worse, too; as software becomes more complex and proliferates in the cloud, the supply chain also becomes more distributed and introduces several new points of trust, including in programming language package managers, operating system package managers, software platforms such as Kubernetes and the software itself being developed.
Signing is one of the answers for combating supply chain attacks. Assuming that private keys are kept private to the software producer and that trust of the signing keys can be established ahead of time for the client, signing allows a client to assert that the software it received was packaged by the organization owning the signing keys and wasn’t tampered with.
We'd like to add this functionality to at least some of the cert-manager artifacts, possibly expanding the list of signed artifacts in the future to include more.
See also the project spec and the technical spec.
What to Sign?
To start, we'd like to add signing for:
To ensure that nobody can access the private key of the signing keypair, we'll use KMS to store the key, and all signing operations will go through that key.
Pull Requests and Work
signKeyannotationBonus PRs arising from this work:
gcb stagecleanup/kind feature
The text was updated successfully, but these errors were encountered: